Fig. 4From: A novel two-phase cycle algorithm for effective cyber intrusion detection in edge computingThe chromosome represents which solutions are selected in the combination solution setBack to article page